Overview
Gain visibility, detection, and response capabilities to protect ICS/OT environments against sophisticated threats including nation-state adversaries targeting critical infrastructure.
ICS515 teaches an intelligence-driven approach to ICS cybersecurity, preparing you to monitor, detect, and respond to threats like STUXNET, CRASHOVERRIDE, TRISIS, and PIPEDREAM.
What You Will Learn:
Threat Intelligence
- Understand ICS threat actors and attack campaigns
- Analyze real-world ICS attacks and malware
- Apply threat intelligence to defensive operations
- Use the ICS Cyber Kill Chain framework
Visibility and Asset Identification
- Build comprehensive ICS asset inventories
- Analyze ICS protocols and network traffic
- Develop collection management strategies
- Map ICS network topologies
Detection and Threat Hunting
- Detect Stage 1 and Stage 2 ICS intrusions
- Hunt for threats safely in OT environments
- Identify control manipulation attempts
- Validate system logic changes
Incident Response
- Perform safe ICS incident response
- Acquire and analyze digital evidence
- Conduct memory forensics on HMI systems
- Analyze PLC logic for root cause determination
22 hands-on labs include building and programming a PLC, operating industrial processes, detecting intrusions, acquiring evidence safely, analyzing phishing attacks, performing HMI memory forensics, and a full-day Capstone challenge.
Students receive a programmable logic controller kit with sector simulation board to keep.
Prepares for GIAC GRID certification (exam sold separately). Ideal for ICS Incident Responders, Threat Hunters, SOC Analysts, and Security Operations personnel.
36 CPE credits. 6 days of expert-led training.
Highlights
- Gain ICS network visibility and build asset inventories. Detect Stage 1 and Stage 2 intrusions in OT environments. Perform safe ICS incident response and forensics. Apply threat intelligence to defend against nation-state adversaries.
- 22 hands-on labs including PLC programming, intrusion detection, evidence acquisition, memory forensics, malware analysis, and a full-day Capstone challenge. Includes a PLC kit you keep.
- Prepares for GIAC GRID certification (exam sold separately). Ideal for ICS incident responders and threat hunters. 6 days of expert-led training. Earn 36 CPE credits.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
ICS515 - Single User | Single user license for ICS - ICS515: ICS Visibility, Detection, & Response | $9,230.00 |
Vendor refund policy
Refund requests must be submitted by the deadline date specific to User's training event. To find the specific deadline date for User's training event, please go to training event link at <www.sans.org > and click on the cancellations link.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.